27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

version of Thunderbird is: \n %L<br />

Solution: Upgrade to version 2.0.0.19 or higher.<br />

CVE-2008-5512<br />

Samba 3.2.0 - 3.2.6 Unauthorized Access<br />

<strong>PVS</strong> ID: 4807 FAMILY: Samba<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:35298<br />

Description: Synopsis : \n\nThe remote Samba server may be affected by an unauthorized access<br />

vulnerability.\n\nAccording to its banner, the version of the Samba server on the remote<br />

host is between 3.2.0 and 3.2.6 inclusive. Such versions reportedly allow an authenticated<br />

remote user to gain access to the root filesystem, subject to his or her privileges, by making<br />

a request for a share called '' (empty string) from a version of smbclient prior to 3.0.28.<br />

Successful exploitation of this issue requires 'registry shares' to be enabled, which is not<br />

enabled by default.\n\nThe reported version of Samba is: \n %L<br />

Solution: Upgrade to version 3.2.7 or higher or apply the appropriate patch referenced in the project's<br />

advisory.<br />

CVE-2009-0022<br />

Hamachi VPN Detection<br />

<strong>PVS</strong> ID: 4808 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a client VPN application that allows remote users to connect to<br />

the computer and use it as a tunnel into the internal network. Hamachi works by connecting<br />

to an Internet server (a 'frontend' server) from inside a firewalled network. The connection<br />

is then held open and can be accessed by users outside the network. Once connected to<br />

Hamachi, remote users would have the ability to access internal services as if they were<br />

directly attached to the network.<br />

Solution: Ensure that such usage is in alignment with corporate policies regarding remote access.<br />

CVE Not available<br />

Hamachi VPN Version Detection<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

<strong>PVS</strong> ID: 4809 FAMILY: Policy RISK: LOW NESSUS ID:Not Available<br />

Description: The remote host is running a client VPN application that allows remote users to connect to<br />

the computer and use it as a tunnel into the internal network. Hamachi works by connecting<br />

to an internet server (a 'frontend' server) from inside a firewalled network. The connection<br />

is then held open and can be accessed by users outside the network. Once connected to<br />

Hamachi, remote users would have the ability to access internal services as if they were<br />

directly attached to the network. The version of Hamachi is: \n %L<br />

Family Internet Services 1269

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!